Microsoft Power Point Files: A Secure Steganographic Carrier

One of the major characteristic of cryptography and steganography is unlimited and limited secret data conversion and embedding respectively. In steganography, concealing unlimited secret data in cover media is unfeasible. Majority of researchers have taken image, text, html, executable files as a steganographic cover media. In this proposed work the authors have considered Microsoft Power Point Files as a cover medium. The authors have developed a methodology which consist two techniques for embedding the valuable unlimited data with three layers of security and high robustness. The resultant stego file undoubtedly can be transmitted any where using any channel. Experimental results show the feasibility of the proposed methodology. resultant data can be understood only by those who can get it back into its original form. This technique is known as encryption. A major drawback of this method is that the existence of data is not hidden. Giving enough time the unreadable encrypted data can be obtained in its original form. As a part of solution to this kind of problems, the concept of steganography has considerably given much attention in recent years. The word steganography is a Greek word giving a meaning to it as ‘writing in hiding’. The main goal of steganography is to communicate message securely in a complete undetectable manner (Allan, 2001; Amin, Salleh, Ibrahim, Katmin, & Shamsuddin, 2003; Bender, Gruhl, Morimoto, & Lu, 1996; Dunbar, 2002; Castiglione, De Santis, & Soriente, 2007). It has been emerged as a skill of concealing private information DOI: 10.4018/jdcf.2011100102 International Journal of Digital Crime and Forensics, 3(4), 16-28, October-December 2011 17 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. inside a carrier that can be considered for all intents and ideas (Zou & Shi, 2005; Artz, 2001; Gutub, Al-Qahtani, & Tabakh, 2009; Johnson & Jajodia, 1998). Digital technology gives us a new way to relate steganographic techniques including hiding information in digital medias. It not only goes well beyond simply by embedding a text in an image, but also pertains to other media, including voice, text, binary files and communication channels (Swanson, Zhu, & Tewfik, 1996; Petitcolas, Anderson, & Kuhn, 1999; Anderson & Petitcolas, 1998). It can be mentioned here that steganography, in respect to constructive approach, generally provides vast potential security and legal data hiding. As far as corporate sectors are concerned, if they cannot hide their important information, this may lead to damage extremely the company’s profitability as well as its sustainability. Again, as a destructive approach, even if steganography is not a threat in general, it may have some bad impacts on the areas where one wants to deal with some kind of unwanted illegal matters (Shejul & Kulkarni, 2010; Sahoo & Tiwari, 2008; Sutaone & Khandare, 2008; Liu & Tsai, 2007; Yan & Ping, 2009).

[1]  Adnan Abdul-Aziz Gutub,et al.  Triple-A: Secure RGB image steganography based on randomization , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[2]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[3]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[4]  Gadadhar Sahoo,et al.  Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization , 2008 .

[5]  M. S. Sutaone,et al.  Image based steganography using LSB insertion technique , 2008 .

[6]  Ling-di Ping,et al.  A New Steganography Algorithm Based on Spatial Domain , 2009, 2009 Second International Symposium on Information Science and Engineering.

[7]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[8]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[9]  Wen-Hsiang Tsai,et al.  A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.

[10]  M. Oguzhan Külekci On scrambling the Burrows-Wheeler transform to provide privacy in lossless compression , 2012, Comput. Secur..

[11]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[12]  K.B. Raja,et al.  A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[13]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[14]  Claudio Soriente,et al.  Taking advantages of a disadvantage: Digital forensics and steganography using document metadata , 2007, J. Syst. Softw..

[15]  M. S. Sutaone,et al.  Image based steganography using LSB insertion , 2008 .

[16]  Anjali A. Shejul,et al.  A DWT Based Approach for Steganography Using Biometrics , 2010, 2010 International Conference on Data Storage and Data Engineering.

[17]  Subariah Ibrahim,et al.  Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..

[18]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[19]  Yun Q. Shi,et al.  Formatted text document data hiding robust to printing, copying and scanning , 2005, 2005 IEEE International Symposium on Circuits and Systems.